[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <24260.1323908071@redhat.com>
Date: Thu, 15 Dec 2011 00:14:31 +0000
From: David Howells <dhowells@...hat.com>
To: Rusty Russell <rusty@...abs.org>
Cc: dhowells@...hat.com, keyrings@...ux-nfs.org,
linux-crypto@...r.kernel.org,
linux-security-module@...r.kernel.org,
linux-kernel@...r.kernel.org, dmitry.kasatkin@...el.com,
zohar@...ux.vnet.ibm.com, arjan.van.de.ven@...el.com,
alan.cox@...el.com, Jon Masters <jcm@...masters.org>
Subject: Re: [PATCH 21/21] MODSIGN: Apply signature checking to modules on module load [ver #3]
Rusty Russell <rusty@...abs.org> wrote:
> > > We can have false positives, but at worst that make us report EINVAL
> > > (bad signature) instead of ENOENT (no signature).
> >
> > EKEYREJECTED please; that way it's the same as RHEL does now.
>
> OK, sure (who knew that was there?).
Second paragraph in the description of patch #21:
These patches have been in use by RHEL and Fedora kernels for years,
and so have been thoroughly tested.
Further down the description:
Any module for which the kernel has a key, but which proves to have a
signature mismatch will not be permitted to load (returning
EKEYREJECTED).
David
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists